test_scratch
/
cti-ATT-CK-v13.1
/enterprise-attack
/x-mitre-data-component
/x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6.json
{ | |
"type": "bundle", | |
"id": "bundle--fe130f25-37b8-4d57-9ba1-f303cf282ee2", | |
"spec_version": "2.0", | |
"objects": [ | |
{ | |
"object_marking_refs": [ | |
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" | |
], | |
"id": "x-mitre-data-component--1887a270-576a-4049-84de-ef746b2572d6", | |
"type": "x-mitre-data-component", | |
"created": "2021-10-20T15:05:19.272Z", | |
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", | |
"modified": "2021-10-20T15:05:19.272Z", | |
"name": "Process Access", | |
"description": "Opening of a process by another process, typically to read memory of the target process (ex: Sysmon EID 10)", | |
"x_mitre_data_source_ref": "x-mitre-data-source--e8b8ede7-337b-4c0c-8c32-5c7872c1ee22", | |
"x_mitre_version": "1.0", | |
"x_mitre_attack_spec_version": "2.1.0", | |
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" | |
} | |
] | |
} |